ICICS 2023

The 25th International Conference on Information and Communications Security
18-20 November, 2023, Nankai University, Tianjin, China

Technical Program Committee (TPC)

Members

  • Willy Susilo, University of Wollongong
  • Shuai Wang, Hong Kong University of Science and Technology
  • Catalin Dragan, University of Surrey
  • Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
  • Stefanos Gritzalis, University of Piraeus
  • Sokratis Katsikas, Norwegian University of Science and Technology
  • Giovanni Livraga, University of Milan
  • Christian Mainka, Ruhr University Bochum
  • Daisuke Mashima, Advanced Digital Sciences Center
  • Siaw-Lynn Ng, Royal Holloway, University of London
  • Satoshi Obana, Hosei University
  • Rolf Oppliger, eSECURITY Technologies
  • Günther Pernul, University of Regensburg
  • Joachim Posegga, University of Passau
  • Giovanni Russello, University of Auckland
  • Vishal Sharma, Queen's University Belfast
  • Elizabeth Quaglia, Royal Holloway, University of London
  • Ashok Kumar Das, Indian Institute of Technology Kharagpur
  • Bo Luo, University of Kansas
  • Bo Qin, Renming University
  • Chao Shen, Xi'an Jiaotong University
  • Chun Guo, Shandong University
  • David A. Mohaisen, University of Central Florida
  • Debiao He, Wuhan University
  • Debin Gao, Singapore Management University
  • Dieter Gollmann, Hamburg University of Technology
  • Dimitrios Papadopoulos, HKUST
  • Ding Wang, Nankai University
  • Fangguo Zhang, Sun Yat-sen University
  • Faysal Hossain Shezan, University of Virginia
  • Fei Gao, Beijing University of Posts and Telecommunications
  • Feng Hao, University of Warwick
  • Feng Lin, Zhejiang University
  • Fengwei Zhang, Southern University of Science and Technology
  • Fuchun Guo, University of Wollongong
  • Haibin Zhang, Beijing Institute of Technology
  • Huaxiong Wang, Nanyang Technological University
  • Hongxin Hu, State University of New York at Buffalo
  • Hung-Min Sun, National Tsing Hua University
  • Hyoungshick Kim, Sungkyunkwan University
  • Jiaxin Pan, Norwegian University of Science and Technology
  • Jianbing Ni, Queen's University
  • Jianfeng Wang, Xidian University
  • Jianting Ning, Fujian Normal University
  • Jingqiang Lin, University of Science and Technology of China
  • Jingwei Li, University of Electronic Science and Technology of China
  • Jinsong Han, Zhejiang University
  • Jin Wook Byun, Pyeongtaek University
  • Juanru Li, Shanghai Jiao Tong University
  • Junzuo Lai, Jinan University
  • Kaitai Liang, Delft University of Technology
  • Kangjie Lu, University of Minnesota
  • Kun Sun, George Mason University
  • Kuo-Hui Yeh, National Dong Hwa University
  • Lei Wang, Shanghai Jiao Tong University
  • Lei Zhang, East China Normal University
  • Lingyu Wang, Concordia University
  • Long Cheng, Clemson university
  • Longjiang Qu, National University of Defense Technology
  • Marko Hölbl, University of Maribor, Maribor, Slovenia
  • Mauro Conti, University of Padua
  • Meng Shen, Beijing Institute of Technology
  • Muhammad Khurram Khan, King Saud University
  • Nitesh Saxena, Texas A&M University
  • Peng Xu, Huazhong University of Science and Technology
  • Qianhong Wu, Beihang University
  • Qi Li, Tsinghua University
  • Qingchuan Zhao, City University of Hong Kong
  • Qingni Shen, Peking University
  • Roberto Di Pietro, Hamad Bin Khalifa University
  • Rongmao Chen, National University of Defense Technology
  • Rongxing Lu, University of New Brunswick
  • Sherman S. M. Chow, Chinese University of Hong Kong
  • Shi-Feng Sun, Shanghai jiao Tong University, China
  • Shujun Li, University of Kent
  • Shuqin Fan, State Key Laboratory of Cryptology
  • Tianren Liu, Peking University
  • Tianwei Zhang, Amazon Web Services
  • Ting Chen, University of Electronic Science and Technology of China
  • Odelu Vanga, Indian Institute of Information Technology Chittoor
  • Weili Han, Fudan University
  • Wei Wang, Beijing Jiaotong University
  • Xiaofeng Chen, Xidian University
  • Xiapu Luo, Hong Kong Polytechnic University
  • Ximeng Liu, Fuzhou University
  • Xun Yi, RMIT University
  • Yang Zhang, CISPA
  • Yi Deng, State Key Laboratory of Information Security
  • Yongbin Zhou, Nanjing University of Science and Technology
  • Yong Guan, Iowa State University
  • Yong Yu, Shaanxi Normal University
  • Yuan Zhang, Fudan University
  • Yuan Zhang, University of Electronic Science and Technology of China
  • Yunkai Zou, Nankai University
  • Yu Yu, Shanghai Jiao Tong University
  • Zhen Ling, Southeast University
  • Zhibo Wang, Zhejiang University
  • Zhikun Zhang, Stanford University
  • Chen Wang, Huazhong University of Science and Technology
  • Yan Jia, Nankai University
  • Ziming Zhao, University at Buffalo
  • Weizhi Meng, Technical Universtiy of Denmark
  • Meicheng Liu, Institute of Information Engineering, Chinese Academy of Sciences
  • Siwei Sun, University of Chinese Academy of Sciences
  • Ming Li, The University of Texas at Arlington
  • Mingwu Zhang, Hubei University of Technology
  • Ling Song, Jinan University, China
  • Haoyu Ma, Zhejiang Lab
  • Jiang Zhang, State Key Laboratory of Cryptology, China
  • Zhicong Huang, Alibaba
  • Guomin Yang, Singapore Management University
  • Siqi Ma, The University of New South Wales, Australia
  • Cristian Mainka, Horst Görtz Institute, Ruhr University Bochum
  • Chunhua Su, University of Aizu, Japan
  • Chao Zhang, Tsinghua University
  • Michael Scott, MIRACL Labs, Ireland
  • Xiaoyu Ji, Zhejiang University
  • Wenhao Wang, State Key Laboratory of Information Security, China
  • Jian Liu, University of Tennessee, Knoxville
  • Boyang Wang, University of Cincinnati
  • Constantin Catalin Dragan, University of Surrey
  • Jian Shen, Nanjing University of Information Science and Technology
  • Toshihire Yamauchi, Okayama University
  • Yuanyuan Zhang, Shanghai Jiaotong University, China
  • Daoyuan Wu, The Chinese University of Hong Kong
  • Peng Gao, Virginia Tech
top